*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 141 - 160 *of* 1*number_thousands_separator*259

141

Approach to Identifying Counterfeit Products with QR Codes and Computational Algorithms
Prabhu Shankar, B ; Rajkumar, N ; Viji, C ; et al.
2024 5th International Conference on Smart Electronics and Communication (ICOSEC) Smart Electronics and Communication (ICOSEC), 2024 5th International Conference on. :1203-1209 Sep, 2024

*Conference*
142

A-Lister: a tool for analysis of differentially expressed omics entities across multiple pairwise comparisons.
Listopad SA ; Norden-Krichmar TM
Publisher: BioMed Central Country of Publication: England NLM ID: 100965194 Publication Model: Electronic Cited Medium: Internet ISSN: 1471-2105 (Electronic) Linking ISSN: 14712105 NLM ISO Abbreviation: BMC Bioinformatics Subsets: MEDLINE

Computational Biology Databases, Factual Fuzzy Logic Gene Expression Profilin... Humans Search Engine
*Academic Journal*
143

PointerScope: Understanding Pointer Patching for Code Randomization
Xie, M. ; Lin, Y. ; Luo, C. ; et al.
IEEE Transactions on Dependable and Secure Computing IEEE Trans. Dependable and Secure Comput. Dependable and Secure Computing, IEEE Transactions on. 20(4):3019-3036 Aug, 2023

*Academic Journal*
144

*This result is not displayed to guests*

145

SECURE-LINK: Next Generation Algorithm for Data Integrity and Encryption
Shriramoj, Om Brahma ; Kaur, Inderdeep ; Yadav, Aniket ; et al.
2024 Asia Pacific Conference on Innovation in Technology (APCIT) Innovation in Technology (APCIT), 2024 Asia Pacific Conference on. :1-5 Jul, 2024

*Conference*
146

RustLIVE: Reducing the Learning Barriers of Rust Through Visualization
Stephens, Diane Beightol ; Lee, Kyu Hyung ; Khandaker, Mustakimur Rahman
2024 IEEE Frontiers in Education Conference (FIE) Frontiers in Education Conference (FIE), 2024 IEEE. :1-9 Oct, 2024

*Conference*
147
148

BREW: A Breakable Web Application for IT-Security Classroom Use
Pohl, Christoph ; Schlierkamp, Kathrin ; Hof, Hans-Joachim
European Conference on Software Engineering Education : ECSEE 2014, 27th and 28th November 2014,191-205

Computer Science - Compu...
*Report*
149

If It’s Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development with API Hardening
Wang, Pei ; Bangert, Julian ; Kern, Christoph
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE) ICSE Software Engineering (ICSE), 2021 IEEE/ACM 43rd International Conference on. :1360-1372 May, 2021

*Conference*
150

Vendor-Aware Industrial Agents: RAG-Enhanced LLMs for Secure On-Premise PLC Code Generation
Kersting, Joschka ; Rummel, Michael ; Benndorf, Gesa

Software Engineering Artificial Intelligence
*Report*
151

Hands-on Tutorial: How Exploitable is Insecure C Code?
Svoboda, David
2021 IEEE Secure Development Conference (SecDev) SECDEV Secure Development Conference (SecDev), 2021 IEEE. :7-8 Oct, 2021

*Conference*
152

How secure is AI-generated Code: A Large-Scale Comparison of Large Language Models
Tihanyi, Norbert ; Bisztray, Tamas ; Ferrag, Mohamed Amine ; et al.

Computer Science - Crypt... Computer Science - Artif... Computer Science - Progr...
*Report*
153

Obuhersys: Dynamic Analysis of Cryptographic API Misuse in Node.js
Badhe, Ronak ; Kuai, Andrew ; Liu, Leon ; et al.
2024 IEEE MIT Undergraduate Research Technology Conference (URTC) Undergraduate Research Technology Conference (URTC), 2024 IEEE MIT. :1-5 Oct, 2024

*Conference*
154

Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated Code
Improta, Cristina

Computer Science - Crypt... Computer Science - Artif... Computer Science - Softw...
*Report*
155

An algorithm for secure deletion in flash memories
Subha, S.
2009 2nd IEEE International Conference on Computer Science and Information Technology Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on. :260-262 Aug, 2009

*Conference*
156

*This result is not displayed to guests*

157

'Make Them Change it Every Week!': A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication
Klemmer, Jan H. ; Gutfleisch, Marco ; Stransky, Christian ; et al.

Computer Science - Crypt...
*Report*
158

Analysis of Source Code Duplication in Ethreum Smart Contracts
Pierro, Giuseppe Antonio ; Tonelli, Roberto
2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) SANER Software Analysis, Evolution and Reengineering (SANER), 2021 IEEE International Conference on. :701-707 Mar, 2021

*Conference*
159
160

Security For Three-Tiered Web Application
Wisal H. Abdulsalam
Ibn Al-Haitham Journal for Pure and Applied Sciences, Vol 28, Iss 2 (2017)

MD5, PHP, SSL, three-tie... Science
*Academic Journal*

*Filter*